Search scope:
排序: Display mode:
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Strategic Study of CAE 2022, Volume 24, Issue 4, Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015
Keywords: quantum cryptography protocols quantum key distribution quantum digital signature quantum private
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020
This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.
Keywords: network electronic identity identity management digital signature
Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2, Pages 168-182 doi: 10.1007/s11705-021-2056-8
Keywords: computer-aided molecular design bio-oil additives molecular signature descriptor
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2, Pages 176-186 doi: 10.1631/FITEE.1700005
Double-authentication-preventing signature (DAPS) is a novel signature notion proposed at ESORICSsignatures on two different messages with the same subject will result in an immediate collapse of the signature
Keywords: Double-authentication-preventing signatures Chameleon hash function Digital signature Provable security
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2, Pages 135-142 doi: 10.1631/FITEE.1500197
Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.
Keywords: Identity Signature Lattice Number theory research unit (NTRU)
Certificateless broadcast multi-signature for network coding Research Article
Huifang YU, Zhewei QI
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9, Pages 1369-1377 doi: 10.1631/FITEE.2200271
Keywords: Network coding Certificateless multi-signature Linear combination Homomorphic hash function
Platform governance in the era of AI and the digital economy
Frontiers of Engineering Management 2023, Volume 10, Issue 1, Pages 177-182 doi: 10.1007/s42524-022-0241-1
Revisiting digital twins: Origins, fundamentals, and practices
Frontiers of Engineering Management Pages 668-676 doi: 10.1007/s42524-022-0216-2
Keywords: virtual manufacturing digital twins modeling and simulation digitization computational engineering
Development trend of urban design in “digital age”: Pan-dimensionality and individual-ubiquity
Frontiers of Structural and Civil Engineering 2021, Volume 15, Issue 3, Pages 569-575 doi: 10.1007/s11709-021-0735-7
Keywords: digital age urban design multiple objectives human-computer interaction pan-dimensionality individual-ubiquity
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Frontiers of Medicine 2023, Volume 17, Issue 4, Pages 768-780 doi: 10.1007/s11684-023-0982-1
Keywords: machine learning methods hypertrophic cardiomyopathy genetic risk
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2, Pages 141-286 doi: 10.1631/FITEE.1900318
Keywords: Identity-based signature Lattice Strong unforgeability Random oracle model
Embracing digital mindsets to ensure a sustainable future
Frontiers of Environmental Science & Engineering 2023, Volume 18, Issue 3, doi: 10.1007/s11783-024-1799-0
Keywords: Wildlife Climate Change Heavy metals Noise LAN Light pollution
Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome
Guangbiao Zhou, Xinchun Zhao
Frontiers of Medicine 2018, Volume 12, Issue 2, Pages 236-238 doi: 10.1007/s11684-017-0611-y
Recently, Ng . reported that the A:T>T:A substitutions, proposed to be a signature of aristolochicchloride and its reactive metabolites chloroethylene oxide, melphalan and chlorambucil, also cause this signature
Keywords: genomic signature carcinogen aristolochic acid tobacco smoke vinyl chloride hepatocellular carcinoma
Design of a digital currency information system based on the UnionPay network
Hongfeng CHAI, Quan SUN, Yu ZHOU, Tao ZHU
Frontiers of Engineering Management 2020, Volume 7, Issue 4, Pages 471-484 doi: 10.1007/s42524-020-0134-0
Keywords: UnionPay network digital currency information system blockchain smart contracts
Title Author Date Type Operation
Current Status and Future Development of Quantum Cryptographic Protocols
Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping
Journal Article
Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World
Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang
Journal Article
Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular
Journal Article
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash
Fei LI, Wei GAO, Gui-lin WANG, Ke-fei CHEN, Chun-ming TANG
Journal Article
Efficient identity-based signature over NTRU lattice
Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO
Journal Article
Development trend of urban design in “digital age”: Pan-dimensionality and individual-ubiquity
Journal Article
Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature
Journal Article
Novel efficient identity-based signature on lattices
Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn
Journal Article
Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome
Guangbiao Zhou, Xinchun Zhao
Journal Article